Return to Article Details Extraction of rules for intrusion detection in computer networks using a genetic algorithm Download Download PDF